Posted
by
timothy
on Saturday August 28, 2010 @09:37AM
from the oopsie-daisy dept.

alphadogg writes with this excerpt from Network World about an experiment gone wrong which affected a big chunk of internet traffic yesterday morning: "It was kicked off when RIPE NCC (Reseaux IP Europeens Network Coordination Centre) and Duke ran an experiment that involved the Border Gateway Protocol (BGP) — used by routers to know where to send their traffic on the Internet. RIPE started announcing BGP routes that were configured a little differently from normal because they used an experimental data format. RIPE's data was soon passed from router to router on the Internet, and within minutes it became clear that this was causing problems. ... [f]or a brief period Friday morning, about 1 percent of all the Internet's traffic was affected by the snafu, as routers could not properly process the BGP routes they were being sent."

The internet has been nulled before, Youtube has been blocked, countless other huge breakages before.The internet is a very frail entity, mainly kept together by trust in the organizations who run the main backbones of each country / continent.And DoSing, more commonly botnet controlled DDoSing tools, are becoming a very popular for blackmarkets of the net these days.

Hell, there was that time where someone, somehow, managed to run a rogue DNS root server for a while and got away wit

I wouldn't say countless. There have probably only been less than 10 blackhole type events with BGP/routing that affected a significant amount of Internet traffic in the past 15 years. The big one being back in 1997. There is a website somewhere that keeps track of them and explains what happened.

Maybe, yes [wired.com]. BGP has been identified as vulnerable for a long time, and this is further proof. On the other hand, this research is probably motivated by fixing the problem. But the Internet is no longer something you can just shut down or reboot to upgrade; you must operate on a live patient. It does make you wonder, though, if well-intentioned people can do this trying to help, what somebody malicious could do. Hopefully governments will decline to use this as a weapon - like poisoning the ocean.

But the Internet is no longer something you can just shut down or reboot to upgrade; you must operate on a live patient.

That's a really important point that often goes undiscussed - it's been suggested that if the Internet did go down (major solar storm, EMP, etc.) that it's not likely that it, or the interconnected systems (electrical grid, etc.) could come back up. Too many race conditions, mostly unknown/undocumented. Sure, eventually it would all get back on track, but it could be weeks-to-months. I'm planning to hike the Appalachian Trail while it gets straightened out.;)

Hopefully governments will decline to use this as a weapon - like poisoning the ocean.

That sounds like a major societal vulnerability that needs to be patched. Nuclear weapons marked an important turning point in history where governments became too dangerous to keep around.

That's kind of the point isn't it? 1% isn't; a few hundred million is. That's the risk of using percentages: they tend to minimize the significance of the real numbers -- or alternatively, overstate their significance.

Ok, so what if 1% of all people on the planet just dropped dead? That would be over 60 million people.

That would be a measurable win for global warming, pollution, species extinction, deforestation, you name it... and I don't think it's politically incorrect to point it out. It might be off topic, though.

1% can be either large or small depending on what is being measured. For example, a Pointy Haired Boss may think the following:

* 1% of your web site user base using a different web browser is insignificant and can easily be ignored.* 1% of your annual profits is HUGE and losing or failing to obtain those means heads must roll.

(of course, a true PHB will never see any potential relationship between the two)

Yesterday, there were a lot of feedback regarding some really mysterious cuts to popular sites. As.tr Govt. is known to censor Internet, people thought something was wrong at the boxes which does the censoring job.

That experiment really went out of hand I think. And, 1% of Internet in 2010 is... Huge. Really huge.

BGP is, like all routing protocols, very secure in and of itself. The difficulty is that a router peering with all routers on the internet can "inject" bad routes, and the "mail" gets reliably delivered to a wrong address. This is ONLY a difficulty if you can somehow gain access to a router that is directly connected to a backbone, and has peering status. You will have to have your own Autonomous System number also, although I am sure you could fake that.

What's the problem? Telnet to one of the routers. When it asks for user name write "admin". Password "1234" and there you go! Oh, and when it prompt you with "Your password hasn't been changed in a long time, do you want to change it?" click on "Never ask me that question again".Easy as cake.

For me I was I fighting for over a year to get some of MY blocks back from another provider. They simply continued to announce the routes for them and made it uttererly worthless. It was also fairly horrible to get any upstream traction against the offender.

Eventually, we simply started announcing the routes for those blocks and caused turmoil for those who were using them. It didn't take long to get that issue cleaned up afterwards. Though it was funny because they had asked my guys to stop announcing.

BGP is a bit of a trust relationship, but it isn't the end of world when everything goes to shit.

Admins will get up for their beds and start clearing issues. Things will be sluggish for a bit, but eventually things work out.

He and a coworker were working for a company, and while they weren't supposed to have the passwords for the BGP routers and whatnot, they did as a matter of expediency. (you know, someone not wanting to walk over somewhere to just enter a code, etc). Anyways, the coworker executed a hard re-computation of the BGP routes rather than a soft one, bringing the entire company's network down for about a half hour until everything was recomputed. The

We've had this issue happen too, thankfully we have an army of lawyers who threatened to bankrupt their upstream providers and called the police on the ISP that was not fixing the issue, it helps when they try announcing IP space that the government uses.

Fake it? Not in the last five years!
unless you know of some BGP peers that refuse the standard peering protocol, 1) they are required to only listen to routes from known surrounding peers, 2) will not be listening to what's being advertised by your router unless you have instructed them ahead of time what AS you manage and what prefixes you will be advertising to them.

if for some strange reason, you manage to be adjacent to a backbone CORE router, and wanted to spend a few years moving traffic from core's to edges of the internet, you could start injecting routes for a short span of time after having been trusted and your metric's lowered, (at some point BGP will fail to converge and your advertisements will begin being ignored by the AS)

for research purposes here in Canada, we have access to a major core router, and are able to inject routes to get traffic routed through a particular peer for a few minutes at a time. wirecapping the lines at that router, we can then monitor for organisational security compliance for penetration testing. (you'd be surprised how often usernames and passwords get sent in clear text, or how often people THINK intra building traffic is being encrypted via a VPN only to find out it's badly midconfigured.)

I too am far from all knowing on the ins and outs of global BGP, but every peering agreement I've read (from about twelve countries and almost a hundred cities) have always been the same. "you are required to listen to ASxxxxx for advertisments for this super block, you are required to listen to these private peers with multi-homing agreements, you are required to advertise with the AS number assigned to you only, you are required to advertise only the prefixes you privately manage, and to contact and update the peers directly adjacent to you if assigned a new superblock. etc"

unless you know of some BGP peers that refuse the standard peering protocol, 1) they are required to only listen to routes from known surrounding peers, 2) will not be listening to what's being advertised by your router unless you have instructed them ahead of time what AS you manage and what prefixes you will be advertising to them.

No. Period, fucking no. Most BGP sessions run between customers and carriers are still basically allowing whatever. Even the big boys basically don't care what you advertise. It would cause too many problems to go and begin filtering, so only regions that seem to have routing DBs (RIPE region) are even remotely participating in this. For the most part, thats a few places here and there, but the carriers will let you do what you want.

Don't believe the hype: BGP is still as weak in public IP as it ever has been. The difference is that if you do decide to hijack someone else's prefixes (don't even include bogons, because the carriers will probably let you advertise those!), everyone will know and you will get your upstream looking at you.

for every major carrier that I've worked with, filtering isn't optional, it's mandatory.

at the tier one level, Qwest, AT&T, Sprint and L3 all dampen their allowable routes to what they know the immediate peers will advertise. at tier two, there will be many smaller ISP's who will haply pass routes to whomever wants to advertise them, but is not going to be listening to BGP messages on customer facing ports. (unless that customer has already made an agreement with that peer to make an AS entry on both sides)

Go check out the Internet Taffic Report [internettr...report.com] from time to time. Today it looks like there was significant event. Wonder what happened.....?

Now don't get me started on PMTUD. How do I explain to a user that it is not 'our' network that is the cause, we have MILLIONS of users working just fine, but everyone in their office can't get on because we broke someth

the trusting nature of BGP? if you inject bad advertisement for too long, you'll get marked as damaged, and the BGP AS will begin converging around you. (cutting off any private subscribers you maintain as they no longer have valid routes back to them from the internet.)

in current BGP, you don't GET trusted, you BUILD trust. you're established a very high metric (or weight) for distance routing initially, and as you carry traffic, (or as more and more traffic originates from your network from your subscr

depends on how you like to manage your equipment. most large companies tend to do it manually, while smaller businesses like to do it automatically.
On BSD and cisco routers, it's easy to assign the metrics by hand. some ISP's will even buy a lower metric from you (forcing more traffic off their links)

Is this the same vulnerability that was on slashdot over a year ago?
http://tech.slashdot.org/article.pl?sid=09/02/22/0310236 [slashdot.org]
The summary tried to make it sound like Mikrotik was to blame, because it sent the bad bgp information, but it was the Cisco that errored out.

Is this the same vulnerability that was on slashdot over a year ago? http://tech.slashdot.org/article.pl?sid=09/02/22/0310236 [slashdot.org] The summary tried to make it sound like Mikrotik was to blame, because it sent the bad bgp information, but it was the Cisco that errored out.

No.
That was a configuration error made on a Mikrotik resulting in massive prepending of the BGP path.
This was a flaw in how unrecognized BGP attributes are handled.

For those of you who don't use Valve's Steam storefront/game launch application, the app has a graph that shows usage rates at various scales. Typically it shows the last 48 hours, and typically the graph is sinusoidal. On Friday morning, at about twenty to eleven and at the top of a wave, connections plunged from 2.2 million to under 300,000, before leaping straight back up to 2 million-odd shortly after eleven.

Here are some pictures showing the effects of the disruption [blogspot.com], including a 6x or more increase in messaging over the "background chatter" on the Internet, and a description of what went wrong.